pub struct HTTPRouteRules {
pub backend_refs: Option<Vec<HTTPRouteRulesBackendRefs>>,
pub filters: Option<Vec<HTTPRouteRulesFilters>>,
pub matches: Option<Vec<HTTPRouteRulesMatches>>,
pub name: Option<String>,
pub retry: Option<HTTPRouteRulesRetry>,
pub session_persistence: Option<HTTPRouteRulesSessionPersistence>,
pub timeouts: Option<HTTPRouteRulesTimeouts>,
}
Expand description
HTTPRouteRule defines semantics for matching an HTTP request based on conditions (matches), processing it (filters), and forwarding the request to an API object (backendRefs).
Fields§
§backend_refs: Option<Vec<HTTPRouteRulesBackendRefs>>
BackendRefs defines the backend(s) where matching requests should be sent.
Failure behavior here depends on how many BackendRefs are specified and how many are invalid.
If all entries in BackendRefs are invalid, and there are also no filters specified in this route rule, all traffic which matches this rule MUST receive a 500 status code.
See the HTTPBackendRef definition for the rules about what makes a single HTTPBackendRef invalid.
When a HTTPBackendRef is invalid, 500 status codes MUST be returned for requests that would have otherwise been routed to an invalid backend. If multiple backends are specified, and some are invalid, the proportion of requests that would otherwise have been routed to an invalid backend MUST receive a 500 status code.
For example, if two backends are specified with equal weights, and one is invalid, 50 percent of traffic must receive a 500. Implementations may choose how that 50 percent is determined.
When a HTTPBackendRef refers to a Service that has no ready endpoints, implementations SHOULD return a 503 for requests to that backend instead. If an implementation chooses to do this, all of the above rules for 500 responses MUST also apply for responses that return a 503.
Support: Core for Kubernetes Service
Support: Extended for Kubernetes ServiceImport
Support: Implementation-specific for any other resource
Support for weight: Core
filters: Option<Vec<HTTPRouteRulesFilters>>
Filters define the filters that are applied to requests that match this rule.
Wherever possible, implementations SHOULD implement filters in the order they are specified.
Implementations MAY choose to implement this ordering strictly, rejecting any combination or order of filters that can not be supported. If implementations choose a strict interpretation of filter ordering, they MUST clearly document that behavior.
To reject an invalid combination or order of filters, implementations SHOULD consider the Route Rules with this configuration invalid. If all Route Rules in a Route are invalid, the entire Route would be considered invalid. If only a portion of Route Rules are invalid, implementations MUST set the “PartiallyInvalid” condition for the Route.
Conformance-levels at this level are defined based on the type of filter:
- ALL core filters MUST be supported by all implementations.
- Implementers are encouraged to support extended filters.
- Implementation-specific custom filters have no API guarantees across implementations.
Specifying the same filter multiple times is not supported unless explicitly indicated in the filter.
All filters are expected to be compatible with each other except for the
URLRewrite and RequestRedirect filters, which may not be combined. If an
implementation can not support other combinations of filters, they must clearly
document that limitation. In cases where incompatible or unsupported
filters are specified and cause the Accepted
condition to be set to status
False
, implementations may use the IncompatibleFilters
reason to specify
this configuration error.
Support: Core
matches: Option<Vec<HTTPRouteRulesMatches>>
Matches define conditions used for matching the rule against incoming HTTP requests. Each match is independent, i.e. this rule will be matched if any one of the matches is satisfied.
For example, take the following matches configuration:
matches:
- path:
value: "/foo"
headers:
- name: "version"
value: "v2"
- path:
value: "/v2/foo"
For a request to match against this rule, a request must satisfy EITHER of the two conditions:
- path prefixed with
/foo
AND contains the headerversion: v2
- path prefix of
/v2/foo
See the documentation for HTTPRouteMatch on how to specify multiple match conditions that should be ANDed together.
If no matches are specified, the default is a prefix path match on “/”, which has the effect of matching every HTTP request.
Proxy or Load Balancer routing configuration generated from HTTPRoutes MUST prioritize matches based on the following criteria, continuing on ties. Across all rules specified on applicable Routes, precedence must be given to the match having:
- “Exact” path match.
- “Prefix” path match with largest number of characters.
- Method match.
- Largest number of header matches.
- Largest number of query param matches.
Note: The precedence of RegularExpression path matches are implementation-specific.
If ties still exist across multiple Routes, matching precedence MUST be determined in order of the following criteria, continuing on ties:
- The oldest Route based on creation timestamp.
- The Route appearing first in alphabetical order by “{namespace}/{name}”.
If ties still exist within an HTTPRoute, matching precedence MUST be granted to the FIRST matching rule (in list order) with a match meeting the above criteria.
When no rules matching a request have been successfully attached to the parent a request is coming from, a HTTP 404 status code MUST be returned.
name: Option<String>
Name is the name of the route rule. This name MUST be unique within a Route if it is set.
Support: Extended
retry: Option<HTTPRouteRulesRetry>
Retry defines the configuration for when to retry an HTTP request.
Support: Extended
session_persistence: Option<HTTPRouteRulesSessionPersistence>
SessionPersistence defines and configures session persistence for the route rule.
Support: Extended
timeouts: Option<HTTPRouteRulesTimeouts>
Timeouts defines the timeouts that can be configured for an HTTP request.
Support: Extended
Trait Implementations§
Source§impl Clone for HTTPRouteRules
impl Clone for HTTPRouteRules
Source§fn clone(&self) -> HTTPRouteRules
fn clone(&self) -> HTTPRouteRules
1.0.0 · Source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreSource§impl Debug for HTTPRouteRules
impl Debug for HTTPRouteRules
Source§impl Default for HTTPRouteRules
impl Default for HTTPRouteRules
Source§fn default() -> HTTPRouteRules
fn default() -> HTTPRouteRules
Source§impl<'de> Deserialize<'de> for HTTPRouteRules
impl<'de> Deserialize<'de> for HTTPRouteRules
Source§fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error>where
__D: Deserializer<'de>,
Source§impl JsonSchema for HTTPRouteRules
impl JsonSchema for HTTPRouteRules
Source§fn schema_name() -> String
fn schema_name() -> String
Source§fn schema_id() -> Cow<'static, str>
fn schema_id() -> Cow<'static, str>
Source§fn json_schema(generator: &mut SchemaGenerator) -> Schema
fn json_schema(generator: &mut SchemaGenerator) -> Schema
Source§fn is_referenceable() -> bool
fn is_referenceable() -> bool
$ref
keyword. Read moreSource§impl PartialEq for HTTPRouteRules
impl PartialEq for HTTPRouteRules
Source§impl Serialize for HTTPRouteRules
impl Serialize for HTTPRouteRules
impl StructuralPartialEq for HTTPRouteRules
Auto Trait Implementations§
impl Freeze for HTTPRouteRules
impl RefUnwindSafe for HTTPRouteRules
impl Send for HTTPRouteRules
impl Sync for HTTPRouteRules
impl Unpin for HTTPRouteRules
impl UnwindSafe for HTTPRouteRules
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
Source§impl<T> Instrument for T
impl<T> Instrument for T
Source§fn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
Source§fn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
Source§impl<T> IntoEither for T
impl<T> IntoEither for T
Source§fn into_either(self, into_left: bool) -> Either<Self, Self>
fn into_either(self, into_left: bool) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left
is true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read moreSource§fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
fn into_either_with<F>(self, into_left: F) -> Either<Self, Self>
self
into a Left
variant of Either<Self, Self>
if into_left(&self)
returns true
.
Converts self
into a Right
variant of Either<Self, Self>
otherwise. Read more